Engineering Blog

                            
Avatar

Sirisha Badursha

LLM Development Unplugged: A Practical Guide from Code to Deployment

LLM Development Unplugged: A Practical Guide from Code to Deployment

Date : June 5Time : 1:00 PM ET/17:00 UTCPresenters : Sebastian Raschka , Marlene Mhangami Introduction: Join us for an insightful talk that will walk you through the crucial stages involved in developing large language models (LLMs). Whether you’re a seasoned developer, a data scientist, or simply curious about how these powerful AI models are…

Stay Ahead with Kubernetes: Master Cost and Compliance with Kyverno and Kubecost

Stay Ahead with Kubernetes: Master Cost and Compliance with Kyverno and Kubecost

Date : May 30Time : 9:00 – 10:00 AM PDT / 12:00 noon – 1:00 PM EDT / 4:00 – 5:00 PM GMT In the fast-evolving world of cloud-native applications, managing Kubernetes environments efficiently and cost-effectively is crucial. Our upcoming webinar is designed to guide you through leveraging two powerful tools, Kyverno and Kubecost, running…

AI Infrastructure Mastery: Collaborative Approaches for Success
AI

AI Infrastructure Mastery: Collaborative Approaches for Success

Navigating the Challenges of Rapid AI/ML Advancements Designing a singular AI/ML system amidst the rapid advancements in applications and models, such as XGboost, deep learning recommendation models, and large language models (LLMs), presents significant challenges. Each type of model has unique demands: LLMs require high TFlops for processing, while deep learning models often encounter memory…

Stay Current: The Vital Role of Data Streaming in AI Applications
AI

Stay Current: The Vital Role of Data Streaming in AI Applications

In the realm of generative AI, especially those applications based on Retrieval-Augmented Generation (RAG) models, the efficiency and accuracy of your system heavily depend on how well you manage and integrate your data. Here’s a detailed look into why you need to build robust data storage systems and leverage data streaming to enhance your generative…

Discover the Power of Service Meshes and API Gateways with Buoyant and Ambassador

Discover the Power of Service Meshes and API Gateways with Buoyant and Ambassador

Date : May 23Time : 10am CST In the rapidly evolving world of cloud-native applications, understanding the nuances of service meshes and API gateways is crucial for ensuring robust, scalable, and reliable infrastructure. Join us as Buoyant’s Tech Evangelist, Flynn, and Ambassador’s Senior Software Engineer, Alice Wasko, delve into this intricate landscape. In their comprehensive…

Meet Your Storage Needs with Hetzner’s Enhanced Server Lineup

Hetzner has unveiled its upgraded series of dedicated storage servers, tailored to address the ever-growing storage requirements of today’s digital landscape. Combining the speed of NVMe SSDs with the vast capacity of HDDs, these servers are perfect for large data storage, database hosting, and more. Each model, from the entry-level SX65 to the robust SX295,…

Empowering Developers: Feature Flags and Authorization in Focus

Empowering Developers: Feature Flags and Authorization in Focus

Date : May 22 2024Time : 5:00 pm CEST, 11:00 am EDT This webinar highlights the crucial roles of feature flags and authorization in software development. Feature flags, exemplified by Flagsmith, empower developers to control feature deployments and manage testing environments effectively, enabling controlled rollouts and A/B testing. Meanwhile, Cerbos emphasizes the pivotal role of…

Mastering NoSQL: Transitioning from SQL with Ease

Mastering NoSQL: Transitioning from SQL with Ease

Date : May 23 2024Time : 10am PT | 1pm ET | 5pm GMT Transitioning from SQL to NoSQL databases entails embracing a paradigm shift in database management. Developers need to understand the flexibility, scalability, and schema-less nature of NoSQL databases, as well as the diverse data models and querying mechanisms they employ. Data modeling…

Unlocking the Potential: How NIST CSF 2.0 Redefines Cybersecurity Governance

Unlocking the Potential: How NIST CSF 2.0 Redefines Cybersecurity Governance

Date : May 29Time : 8.30 pm (Virtual) The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely recognized set of guidelines and best practices for managing cybersecurity risks. Recently, NIST released version 2.0 of the CSF, marking the first major upgrade in a decade. This update introduces several new requirements,…

From Alerts to Attacks: Let AI Drive Your Security Strategy with Elastic Security

From Alerts to Attacks: Let AI Drive Your Security Strategy with Elastic Security

Traditional SIEMs have long relied on human intervention for effective threat detection and response. However, the emergence of AI-driven security analytics solutions is revolutionizing the landscape of Security Operations Centers (SOCs). Elastic Security, powered by the Elastic Search AI platform, is leading this transformation by replacing manual processes with automated, AI-driven capabilities. With features like…